qubes-doc/developer/releases/4_1/release-notes.rst

154 lines
4.8 KiB
ReStructuredText
Raw Normal View History

2024-05-21 14:59:46 -04:00
==========================
Qubes OS 4.1 release notes
==========================
New features and improvements since Qubes 4.0
---------------------------------------------
- Optional qubes-remote-support package now available from repositories
(strictly opt-in, no package installed by default; no new ports or
network connections open by default; requires explicit connection
initiation by the user, then requires sharing a code word with the
remote party before a connection can be established; see
`#6364 <https://github.com/QubesOS/qubes-issues/issues/6364>`__ for
more information)
- Qubes firewall reworked to be more defensive (see
`#5540 <https://github.com/QubesOS/qubes-issues/issues/5540>`__ for
details)
- Xen upgraded to version 4.14
- Dom0 operating system upgraded to Fedora 32
- Default desktop environment upgraded to Xfce 4.14
- Upgraded default template releases
- Experimental support for GUI running outside of dom0 (hybrid mode GUI
domain without real GPU passthrough; see
`#5662 <https://github.com/QubesOS/qubes-issues/issues/5662>`__ for
details)
- Experimental support for audio server running outside of dom0 (“Audio
domain”)
- sys-firewall and sys-usb are now disposables by default
- UEFI boot now loads GRUB, which in turn loads Xen, making the boot
path similar to legacy boot and allowing the user to modify boot
parameters or choose an alternate boot menu entry
- New qrexec policy format (see
`#4370 <https://github.com/QubesOS/qubes-issues/issues/4370>`__ for
details)
- qrexec protocol improvements (see
`#4909 <https://github.com/QubesOS/qubes-issues/issues/4909>`__ for
details)
- New qrexec-policy daemon
- Simplified using in-qube kernels
- Windows USB and audio support courtesy of
`tabit-pro <https://github.com/tabit-pro>`__ (see
`#5802 <https://github.com/QubesOS/qubes-issues/issues/5802>`__ and
`#2624 <https://github.com/QubesOS/qubes-issues/issues/2624>`__)
- Clarified disposable-related terminology and properties
- Default kernelopts can now be specified by a kernel package
- Improved support for high-resolution displays
- Improved notifications when a system drive runs out of free space
- Support for different cursor shapes
- “Paranoid mode” backup restore option now properly supported using
disposables
- Users can now choose between Debian and Fedora in the installer
- Certain files and applications are now opened in disposables, e.g.,
Thunderbird email attachments
- New graphical interface for managing testing repository updates
- New “Cute Qube” icon family (replaces padlock icons)
- Disposable qube types now use the disposable icon
- New Template Manager tool for installing, removing, and updating
templates (meanwhile, the tool previously known as the “Template
Manager,” which was for mass template switching, has been integrated
into the Qube Manager)
- The “file” storage driver has been deprecated in Qubes 4.1 and will
be removed in Qubes 4.2
- ``property-del`` event renamed to ``property-reset`` to avoid
confusion
- qrexec no longer supports non-executable files in ``/etc/qubes-rpc``
- qrexec components have been reorganized into the core-qrexec
repository
- The ``qvm-pool`` argument parser has been rewritten and improved
- Removed the need for the out-of-tree u2mfn kernel module
- Qrexec services can now run as a socket server
- Improved template distribution mechanism
- Now possible to restart qrexec-agent
- The term “VM” has largely been replaced by “qube”
- GUI daemon is now configured using ``qvm-features`` tool,
``/etc/qubes/guid.conf`` file is no longer used
- ``qvm-run`` tool got ``--no-shell`` option to run a single command
without using a shell inside the qube
- MAC Randomization for iwlwifi (see
`#938 <https://github.com/QubesOS/qubes-issues/issues/938>`__)
For a full list, including more detailed descriptions, please see
`here <https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+sort%3Aupdated-desc+milestone%3A%22Release+4.1%22+label%3A%22release+notes%22+is%3Aclosed>`__.
Known issues
------------
For a full list of known 4.1 issues with open bug reports, please see
`here <https://github.com/QubesOS/qubes-issues/issues?q=is%3Aopen+is%3Aissue+milestone%3A%22Release+4.1%22+label%3A%22T%3A+bug%22>`__.
We strongly recommend :doc:`updating Qubes OS </user/how-to-guides/how-to-update>`
immediately after installation in order to apply any and all available
bug fixes.
Download
--------
See :doc:`downloads </user/downloading-installing-upgrading/downloads>`.
Installation instructions
-------------------------
See the :doc:`installation guide </user/downloading-installing-upgrading/installation-guide>`.
Upgrading
---------
Please see :doc:`how to upgrade to Qubes 4.1 </user/downloading-installing-upgrading/upgrade/4_1>`.